Data encryption method and device applied to electric energy meter and storage medium

A data encryption and energy meter technology, applied in the electric power field, can solve the problems of huge operation and maintenance workload, affecting the communication transmission efficiency between two cores, and inconvenient operation.

Active Publication Date: 2020-06-26
HEXING ELECTRICAL +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Disadvantages of Scheme 1: Due to the dual-core physical separation scheme, and the communication protocol between the dual-core links is open, if a third-party illegal intermediary uses illegal means to intercept the communication data and re-use the dual-core link communication protocol after modification After the format is combined and sent to the receiving end, the receiving end cannot know whether the source of the data is legal. Once the data is processed as legal data, it is very likely to cause abnormal data and operation of the electric energy meter, affecting legal measurement, and invalidating measurement data errors.
[0011] Disadvantages of Scheme 2: The power company needs to manage the encryption key of the electric energy meter in a large database. When the management module is damaged on site and needs to be replaced, the electric power company needs to obtain the encryption key between the two cores of the electric energy meter by obtaining the asset information of the electric energy meter. key and set it to the new management module, after which the new management module can be used to replace the fault managem...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device applied to electric energy meter and storage medium
  • Data encryption method and device applied to electric energy meter and storage medium
  • Data encryption method and device applied to electric energy meter and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0068] The core of the application is to provide a data encryption method, device and storage medium applied to electric energy meters.

[0069] In order to enable those skilled in the art to better understand the solution of the present application, the present application will be further described in detail below in conjunction with the drawings and specific implementation methods.

[0070] This application involves two encryption algorithms, one is a symmetric...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method and device applied to an electric energy meter and a storage medium. The method comprises the steps: obtaining a public key ciphertext, and decryptingthe public key ciphertext through an authentication public key, so as to obtain a public key of a management module; and the random number generated by the random number generator is encrypted throughthe public key to obtain a random number ciphertext, and the random number ciphertext is sent to the management module, so that the management module can decrypt the random number ciphertext througha private key of the management module to obtain the random number to realize synchronization of the encryption key. And finally, encrypting or decrypting the communication data by taking the random number as an encryption key. Therefore, the data volume of the public key and the random number of the management module is small, asymmetric encryption is carried out on the public key and the randomnumber, the problem of large calculation amount can be solved, and the safety is high; the communication data is encrypted symmetrically due to the fact that the data volume of the communication datais large, and the used encryption key is a random number, so that a key management big database is not needed, and the problem that an electric power company needs to additionally add the key management big database can be solved.

Description

technical field [0001] The present application relates to the field of electric power technology, in particular to a data encryption method, device and storage medium applied to electric energy meters. Background technique [0002] The electric energy meter in this application mainly refers to the multi-core multi-module intelligent electric energy meter, which may include but not limited to IR46 electric energy meter, wherein the electric energy meter is composed of metering module, management module, communication module and expansion module, etc. Composed to realize the electric energy meter with the functions of electric energy metering, data processing, real-time monitoring, automatic control and information interaction. [0003] The IR46 standard divides the software part into legal metering part software and non-legal metering part software, and clearly states that the electric energy meter should be able to protect legal metering information and isolate the metering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0442H04L63/0823H04L63/0435H04L9/3247H04L9/0861H04L9/0869
Inventor 张敏王柯童李双全朱程鹏王宏飞舒元康陈昌首史少岩
Owner HEXING ELECTRICAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products